Sciweavers

365 search results - page 25 / 73
» Types for Safe Locking
Sort
View
ADBIS
1997
Springer
246views Database» more  ADBIS 1997»
14 years 1 months ago
Concurrency Control in Distributed Object-Oriented Database Systems
Simulating distributed database systems is inherently difficult, as there are many factors that may influence the results. This includesarchitectural options as well as workload...
Kjetil Nørvåg, Olav Sandstå, Kj...
ATAL
2004
Springer
14 years 2 months ago
On Safe Kernel Stable Coalition Forming among Agents
We investigate and discuss safety and privacy preserving properties of a game-theortic based coalition algorithm KCA for forming kernel stable coalitions among information agents ...
Bastian Blankenburg, Matthias Klusch
GROUP
2003
ACM
14 years 2 months ago
Using the transformational approach to build a safe and generic data synchronizer
Reconciliating divergent data is an important issue in concurrent engineering, mobile computing and software configuration management. Currently, a lot of synchronizers or merge ...
Pascal Molli, Gérald Oster, Hala Skaf-Molli...
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
14 years 22 days ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
CCR
2004
147views more  CCR 2004»
13 years 8 months ago
Safe compositional specification of networking systems
The science of network service composition has emerged as one of the grand themes of networking research [17] as a direct result of the complexity and sophistication of emerging n...
Azer Bestavros, Adam Bradley, Assaf J. Kfoury, Ibr...